Category: Cyber Attacks

Here's a fun assessment you can perform on your home network. I'm running Kali Linux 2018.1 in a virtual machine using VMware Workstation Player. My wireless network adapter is an Alfa AWUS036NHA with a 9dBi omni-directional antenna. Penetration testers may use the Fern Wi-Fi cracker as a security auditing tool to test the security of... Continue Reading →

A DoS and a DDoS...What's the difference? A "Denial of Service," or "DoS" attack, is a category of advanced cyberattack in which a single malicious user denies legitimate users access to a service by blocking or exhausting the resources of a victim system. The DoS is commonly carried out through some form of flooding mechanism,... Continue Reading →

The TCP/IP protocol suite, our conceptual model we use to explain the way in which data travels across a network, contains a myriad of communication protocols. The TCP/IP protocol suite generically refers to two main protocols: TCP and UDP, but there are many other protocols, some of which can be abused to create covert channels.... Continue Reading →

You read that right: Refrigerators are hacking people (or at least they can). The machine that you use to keep your perishables fresh can also be used maliciously against you if a hacker hijacks it. This all stems from a concept called the "Internet of Things," or "IoT." This has become an increasingly common topic... Continue Reading →

An Italian researcher has recently discovered a text bug that can crash any Apple iPhone, iPad, or Mac. A single character from the Telugu language, which is a language native to India, will crash the device when sent via the iOS messaging app, What’s app, Facebook Messenger, Gmail, or even in the iOS Notes The... Continue Reading →

The "Ping of Death" abuses the "Internet Control Message Protocol," which we rely on for troubleshooting and reporting utilities on our network, such as the "Ping" command. Network folks usually "ping" another host or system, either on the local network or on the Internet, to test its reachability. For example, you could ping a Web... Continue Reading →